CVE-2026-5773
wrong reuse of SMB connection
Description
libcurl might in some circumstances reuse the wrong connection for SMB(S) transfers. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criteria must be met. Due to a logical error in the code, a network transfer operation that was requested by an application could wrongfully reuse an existing SMB connection to the same server that was using a different 'share' than the new subsequent transfer should. This could in unlucky situations lead to the download of the wrong file or the upload of a file to the wrong place. When this happens, the same credentials are used and the server name is the same.
INFO
Published Date :
May 13, 2026, 8:27 a.m.
Last Modified :
May 13, 2026, 9:05 a.m.
Remotely Exploit :
No
Source :
curl
Solution
- Update libcurl to the latest version.
- Review connection handling for SMB(S) transfers.
- Test connection reuse logic thoroughly.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-5773 vulnerability anywhere in the article.